Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 13:47

General

  • Target

    file.exe

  • Size

    247KB

  • MD5

    db0915efc5df3cca31e05b8b3ac0f5ee

  • SHA1

    6d25d1ba8cc8716b6c9f40d6fc998b174418c2bb

  • SHA256

    344cdf9460d4d63a1cd728f6edaaf15cdbd540058dc8cb5a48a059a380fe21a4

  • SHA512

    86126487cd2d78a82e284922eb187280123506d5c9a875c1178f5b35e28784d72507baefcb662061eb20b4ff8633634dd47f251bf93e46707981d91814d55433

  • SSDEEP

    3072:ufniykEWHMXNrACbZ6rDLrBoVDf78BOIKWwtY1:ekEWH+JDbZ6SIOOwt

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nzlnwqzh\
      2⤵
        PID:2888
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\rhdsnfdl.exe" C:\Windows\SysWOW64\nzlnwqzh\
        2⤵
          PID:2372
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create nzlnwqzh binPath= "C:\Windows\SysWOW64\nzlnwqzh\rhdsnfdl.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:776
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description nzlnwqzh "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:1400
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start nzlnwqzh
          2⤵
          • Launches sc.exe
          PID:4908
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:4912
      • C:\Windows\SysWOW64\nzlnwqzh\rhdsnfdl.exe
        C:\Windows\SysWOW64\nzlnwqzh\rhdsnfdl.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          PID:1864

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\rhdsnfdl.exe

        Filesize

        13.9MB

        MD5

        b6600edba5205d1d244de1f48ee86621

        SHA1

        9d9075082842ab8ba81e70aaa5b62238adbdec79

        SHA256

        234403e857d40575c578d34c43fe806ab6dbf1f36a0fb4695a4b88ba8b507c96

        SHA512

        89a216517cbbc23d26ff6783ddbc9a6c6ff66bfc2aa5a629d5c274f06c346279d54c951ad9c674c88b5679135734b29ddf9232c56e0d954963366717df96e8db

      • C:\Windows\SysWOW64\nzlnwqzh\rhdsnfdl.exe

        Filesize

        13.9MB

        MD5

        b6600edba5205d1d244de1f48ee86621

        SHA1

        9d9075082842ab8ba81e70aaa5b62238adbdec79

        SHA256

        234403e857d40575c578d34c43fe806ab6dbf1f36a0fb4695a4b88ba8b507c96

        SHA512

        89a216517cbbc23d26ff6783ddbc9a6c6ff66bfc2aa5a629d5c274f06c346279d54c951ad9c674c88b5679135734b29ddf9232c56e0d954963366717df96e8db

      • memory/208-10-0x0000000002450000-0x0000000002463000-memory.dmp

        Filesize

        76KB

      • memory/208-4-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/208-3-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/208-7-0x00000000008B0000-0x00000000009B0000-memory.dmp

        Filesize

        1024KB

      • memory/208-2-0x0000000002450000-0x0000000002463000-memory.dmp

        Filesize

        76KB

      • memory/208-9-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/208-1-0x00000000008B0000-0x00000000009B0000-memory.dmp

        Filesize

        1024KB

      • memory/1864-14-0x0000000001220000-0x0000000001235000-memory.dmp

        Filesize

        84KB

      • memory/1864-19-0x0000000001220000-0x0000000001235000-memory.dmp

        Filesize

        84KB

      • memory/1864-20-0x0000000001220000-0x0000000001235000-memory.dmp

        Filesize

        84KB

      • memory/1864-21-0x0000000001220000-0x0000000001235000-memory.dmp

        Filesize

        84KB

      • memory/2404-13-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2404-16-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2404-12-0x0000000000960000-0x0000000000A60000-memory.dmp

        Filesize

        1024KB